Retrieve Site-to-Site Details: If your NiFi is
running securely, in order for another NiFi instance to retrieve information from your
instance, it needs to be added to the Global Access "retrieve site-to-site
details" policy. This will allow the other instance to query your instance for
details such as name, description, available peers (nodes when clustered), statistics,
OS port information and available Input and Output ports. Utilizing Input and Output
ports in a secured instance requires additional policy configuration as described
below.

Input Port: In order to allow another NiFi instance
to push data to your local instance, you can simply drag an Input Port onto the Root Process Group of your canvas. After entering a name
for the port, it will be added to your flow. You can now right-click on the Input Port
and choose Configure in order to adjust the name and the number of concurrent tasks that
are used for the port.

If Site-to-Site is configured to run securely, you will need to manage the
port's "receive data via site-to-site" component access policy. Only
those users who have been added to the policy will be able to communicate with the
port.

Output Port: Similar to an Input Port, a DataFlow
Manager may choose to add an Output Port to the Root
Process Group. The Output Port allows an authorized NiFi instance to remotely connect to
your instance and pull data from the Output Port. Configuring the Output Port and
managing the port's access policies will again allow the DFM to control how many
concurrent tasks are allowed, as well as which users are authorized to pull data from
the instance being configured.

In addition to other instances of NiFi, some other applications may use a
Site-to-Site client in order to push data to or receive data from a NiFi instance. For
example, NiFi provides an Apache Storm spout and an Apache Spark Receiver that are able
to pull data from NiFi's Root Group Output Ports.

For information on how to enable and configure Site-to-Site on a NiFi instance, see
the Site-to-Site Properties section of the System Administrator's
Guide.

For information on how to configure access policies, see the Access Policies section of the System Administrator's Guide.